Lucene search

K
githubGitHub Advisory DatabaseGHSA-MXF2-4R22-5HQ9
HistorySep 16, 2022 - 5:05 p.m.

XWiki Platform Web Parent POM vulnerable to XSS in the attachment history

2022-09-1617:05:12
CWE-79
CWE-80
GitHub Advisory Database
github.com
20
xss vulnerability
attachment history
patches
workarounds
xwiki 13.10.6
xwiki 14.3rc1
security advisory

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

72.8%

Impact

It’s possible to store a JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name.

For example, attachment a file with name &gt;<img src>.jpg will execute the alert.

Patches

This issue has been patched in XWiki 13.10.6 and 14.3RC1.

Workarounds

It is possible to replace viewattachrev.vm, the entry point for this attack, by a patched version from the patch without updating XWiki.

References

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
org.xwiki.platform\xwikiMatchplatform
OR
org.xwiki.platform\xwikiMatchplatform
OR
org.xwiki.platform\xwikiMatchplatform

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

0.004 Low

EPSS

Percentile

72.8%

Related for GHSA-MXF2-4R22-5HQ9